Skip to content

Latest commit

 

History

History
31 lines (22 loc) · 1.99 KB

File metadata and controls

31 lines (22 loc) · 1.99 KB

Nessus

AppSec Portal Importer Name: Nessus

Nessus applications:

Scan servers, workstations and network devices for vulnerabilities and misconfigurations.

  • Cloud assets: Scan virtual machines and containers on cloud platforms such as AWS, Azure and Google Cloud.
  • Web applications: Detect web application vulnerabilities such as SQL injection and cross-site scripting (XSS).
  • Domains: Scan domains to identify web configuration and security vulnerabilities.

Curl example

{% code overflow="wrap" %}

curl -X POST localhost/api/v1/scan/import/ -H "Authorization: Token a75bb26171cf391671e67b128bfc8ae1c779ff7b" -H "Content-Type: multipart/form-data" -F "file=@./report-nuclei.json" -F "product_name=Product1" -F "product_type=Application" -F "scanner_name=Nessus" -F "branch=dev" -F "host=103.150.0.102"

{% endcode %}

In this command, the following parameters are used:

  1. -X POST: specifies the HTTP method to be used (in this case, POST)
  2. -H "Authorization: Token <authorization_token>": specifies the authorization token obtained from AppSec Portal.
  3. -H "Content-Type: multipart/form-data": specifies the content type of the request.
  4. -F "file=@<report_file_path>": specifies the path to the report file generated by the scanner.
  5. -F "product_name=<product_name>": specifies the name of the product being scanned.
  6. -F "product_type=<product_type>": specifies the type of the product being scanned.
  7. -F "scanner_name=<scanner_name>": specifies the name of the scanner used to generate the report (Nessus)
  8. -F "branch=<branch_name>": (optional) specifies the name of the branch in the source code repository (if applicable) This parameter is particularly useful when you want to associate the scan results with a specific branch in your repository. If not provided, the scan will be associated with the default branch